Network Security

Amidst the daily threats targeting our data security predominantly, Enterprises have to look into securing their Network Security more than ever. At Pentium, we are committed to designing, provisioning and implementing the best-in-class Technologies to protect your digital assets from any malicious attacks.

We will make sure to help you through our Technical Consultants in designing a robust defensive mechanism that protects your network in an unprecedented way.

net work security.png

Next Generation Firewalls (NGFW)

fire wall.png

Next Generation Firewalls (NGFW) is, as Gartner defines it, a “deep-packet inspection firewall that moves beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall

Benefits of Using a Next Generation Firewall

The differentiating features of next generation firewalls create unique benefits for the companies using them.


NGFWs are able to block malware from entering a network, something that traditional firewalls would never be able to achieve.

They are better equipped to address Advanced Persistent Threats (APTs).

NGFWs can be a low-cost option for companies looking to improve their basic security because they can incorporate the work of antiviruses, firewalls, and other security applications into one solution.

The features of this include application awareness, inspection services, as well as a protection system and awareness tool that benefit the offering at all odds.

Pentium ensured to partner up with the industry leaders in Next Generation Firewalls to support our customers with cutting edge solutions.

Next Generation Intrusion Prevention System (NGIPS)

prevention system.png

The network IDPS market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure web gateways and secure email gateways.

While detection only (IDS) is still often used, a large number of appliances are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods —for example, signatures, protocol anomaly detection, behavioral monitoring and heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI) to uncover unwanted and/or malicious traffic and report or take action on it.

All of the aforementioned methods augment IDPS capabilities with more context to reduce both the number of alerts as well as false-positives. False-positives are still a concern for clients when IDPSs are in blocking mode.

When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology.

The capabilities of leading IDPS products have adapted to changing threats, and next-generation IDPSs

Secure Web Gateway

web gateway.png

A Secure Web Gateway is a security solution that prevents unsecured traffic from entering an internal network of an organization. It is used by enterprises to protect their employees and users from accessing and being infected by malicious Web traffic, websites, viruses and malware. It also ensures the implementation and compliance of the organization's regulatory policy.

According to Gartner, a secure web gateway must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included.

Secure Email Gateway

email gate way.png

Secure Email Gateways provide predelivery protection by blocking email based threats before they reach a mail server. They protect businesses from spam, viruses, malware and denial of service attacks. The gateway scans all incoming, outbound and internal email communications, including attachments and URLs for signs of malicious or harmful content.

Email Gateways will also offer protection from social engineering attacks such as phishing, or business email compromise. The gateway can check the domain of incoming emails, as well as scan for suspicious content within the email, to stop harmful content from coming into the network. Emails that have been marked as malicious are quarantined or rejected. Some systems allow the quarantined emails to be accessed by admins if necessary.

Web Application Firewall (WAF)

firewall.jpg

Commonly abbreviated as WAF, a web application firewall is used to filter, block, or monitor inbound and outbound web application HTTP traffic. Compared to intrusion detection systems (IDS/IPS), WAFs have a strong focus on the application traffic and have the ability to provide deep data flow analysis. When IDS/IPS serves as a gatekeeper of all network traffic, WAF is only looking for attacks that come from applications, monitoring mostly the HTTP/HTTPS protocol. WAFs inspect the traffic as it comes and goes, preventing common attacks that arise from application code vulnerabilities (such as cross-site scripting (XSS), SQL injection).

For better understanding WAF, one thing you need to know is the nature of the modern network attacks. Most of the successful ones were performed when attackers managed to find a vulnerability in the code and use it to make the malware look like a part of application traffic. As web applications grow in complexity, the need for systems that can decode and analyze HTTP/HTTPS traffic specifically using the wide specter of parameters and behavioral patterns grow. WAF is meant to recognize "healthy" application traffic, pay attention to the weakest points and even help to perform web application security tests, find vulnerabilities in code and patch them on the firewall level. Since WAF precisely monitors application traffic, it also serves as a tool for load balancing and keep-alive optimization.

Another strong benefit of using WAF is having protection against zero-day exploits—that is, a "newborn" malware, which is not detected by any known behavior analysis. It is the most dangerous and popular type of threat that traditional security measures are not equipped to mitigate or prevent.